An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)
☆24Jul 8, 2017Updated 8 years ago
Alternatives and similar repositories for firmanal
Users that are interested in firmanal are comparing it to the libraries listed below
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- ☆22May 20, 2016Updated 9 years ago
- gnu radio files☆12Oct 6, 2015Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- security machine learning☆72May 15, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- A tool for recover router password☆34Jun 19, 2018Updated 7 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Learn basic crypto in 2 hours☆16Nov 25, 2021Updated 4 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Feb 4, 2015Updated 11 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago